EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

Docker Container Discovery Via Dockerenv Listing

Detects listing or file reading of ".dockerenv" which can be a sing of potential container discovery

T1082
Sigmalow

Domain Trust Discovery Via Dsquery

Detects execution of "dsquery.exe" for domain trust discovery

T1482
Sigmamedium

DotNET Assembly DLL Loaded Via Office Application

Detects any assembly DLL being loaded by an Office Product

T1204.002
Sigmamedium

DotNet CLR DLL Loaded By Scripting Applications

Detects .NET CLR DLLs being loaded by scripting applications such as wscript or cscript. This could be an indication of potential suspicious execution.

T1055
Sigmahigh

Download File To Potentially Suspicious Directory Via Wget

Detects the use of wget to download content to a suspicious directory

T1105
Sigmamedium

Download from Suspicious Dyndns Hosts

Detects download of certain file types from hosts with dynamic DNS names (selected list)

T1105T1568
Sigmamedium

Download From Suspicious TLD - Blacklist

Detects download of certain file types from hosts in suspicious TLDs

T1566T1203T1204.002
Sigmalow

Download From Suspicious TLD - Whitelist

Detects executable downloads from suspicious remote systems

T1566T1203T1204.002
Sigmalow

DPAPI Backup Keys And Certificate Export Activity IOC

Detects file names with specific patterns seen generated and used by tools such as Mimikatz and DSInternals related to exported or stolen DPAPI backup keys and certificates.

T1555T1552.004
Sigmahigh

DPAPI Domain Backup Key Extraction

Detects tools extracting LSA secret DPAPI domain backup key from Domain Controllers

T1003.004
Sigmahigh

DPAPI Domain Master Key Backup Attempt

Detects anyone attempting a backup for the DPAPI Master Key. This events gets generated at the source and not the Domain Controller.

T1003.004
Sigmamedium

Driver Added To Disallowed Images In HVCI - Registry

Detects changes to the "HVCIDisallowedImages" registry value to potentially add a driver to the list, in order to prevent it from loading.

Sigmahigh

Driver Load From A Temporary Directory

Detects a driver load from a temporary directory

T1543.003
Sigmahigh

Driver/DLL Installation Via Odbcconf.EXE

Detects execution of "odbcconf" with "INSTALLDRIVER" which installs a new ODBC driver. Attackers abuse this to install and run malicious DLLs.

T1218.008
Sigmamedium

DriverQuery.EXE Execution

Detect usage of the "driverquery" utility. Which can be used to perform reconnaissance on installed drivers

Sigmamedium

Drop Binaries Into Spool Drivers Color Folder

Detects the creation of suspcious binary files inside the "\windows\system32\spool\drivers\color\" as seen in the blog referenced below

Sigmamedium

Dropping Of Password Filter DLL

Detects dropping of dll files in system32 that may be used to retrieve user credentials from LSASS

T1556.002
Sigmamedium

DSInternals Suspicious PowerShell Cmdlets

Detects execution and usage of the DSInternals PowerShell module. Which can be used to perform what might be considered as suspicious activity such as dumping DPAPI backup keys or manipulating NTDS.DIT files. The DSInternals PowerShell Module exposes several internal features of Active Directory and Azure Active Directory. These include FIDO2 and NGC key auditing, offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.

T1059.001
Sigmahigh

DSInternals Suspicious PowerShell Cmdlets - ScriptBlock

Detects execution and usage of the DSInternals PowerShell module. Which can be used to perform what might be considered as suspicious activity such as dumping DPAPI backup keys or manipulating NTDS.DIT files. The DSInternals PowerShell Module exposes several internal features of Active Directory and Azure Active Directory. These include FIDO2 and NGC key auditing, offline ntds.dit file manipulation, password auditing, DC recovery from IFM backups and password hash calculation.

T1059.001
Sigmahigh

Dump Credentials from Windows Credential Manager With PowerShell

Adversaries may search for common password storage locations to obtain user credentials. Passwords are stored in several places on a system, depending on the operating system or application holding the credentials.

T1555
Sigmamedium

Dump Ntds.dit To Suspicious Location

Detects potential abuse of ntdsutil to dump ntds.dit database to a suspicious location

Sigmamedium

Dumping of Sensitive Hives Via Reg.EXE

Detects the usage of "reg.exe" in order to dump sensitive registry hives. This includes SAM, SYSTEM and SECURITY hives.

T1003.002T1003.004T1003.005
Sigmahigh

Dumping Process via Sqldumper.exe

Detects process dump via legitimate sqldumper.exe binary

T1003.001
Sigmamedium

DumpMinitool Execution

Detects the use of "DumpMinitool.exe" a tool that allows the dump of process memory via the use of the "MiniDumpWriteDump"

T1036T1003.001
Sigmamedium
PreviousPage 26 of 136Next